[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Updated Debian 12: 12.7 released



------------------------------------------------------------------------
The Debian Project                               https://www.debian.org/
Updated Debian 12: 12.7 released                        press@debian.org
August 31st, 2024              https://www.debian.org/News/2024/20240831
------------------------------------------------------------------------


The Debian project is pleased to announce the seventh update of its
stable distribution Debian 12 (codename "bookworm"). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been
published separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 12 but only updates some of the packages included. There is no
need to throw away old "bookworm" media. After installation, packages
can be upgraded to the current versions using an up-to-date Debian
mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list



Secure Boot and other operating systems
---------------------------------------

Users who boot other operating systems on the same hardware, and who
have Secure Boot enabled, should be aware that shim 15.8 (included with
Debian 12.7) revokes signatures across older versions of shim in the
UEFI firmware. This may leave other operating systems using shim before
15.8 unable to boot.

Affected users can temporarily disable Secure Boot before updating other
operating systems.


Miscellaneous Bugfixes
----------------------

This stable update adds a few important corrections to the following
packages:

+--------------------------+------------------------------------------+
| Package                  | Reason                                   |
+--------------------------+------------------------------------------+
| amd64-microcode [1]      | New upstream release; security fixes     |
|                          | [CVE-2023-31315]; SEV firmware fixes     |
|                          | [CVE-2023-20584 CVE-2023-31356]          |
|                          |                                          |
| ansible [2]              | New upstream stable release; fix key     |
|                          | leakage issue [CVE-2023-4237]            |
|                          |                                          |
| ansible-core [3]         | New upstream stable release; fix         |
|                          | information disclosure issue [CVE-2024-  |
|                          | 0690]; fix template injection issue      |
|                          | [CVE-2023-5764]; fix path traversal      |
|                          | issue [CVE-2023-5115]                    |
|                          |                                          |
| apache2 [4]              | New upstream stable release; fix content |
|                          | disclosure issue [CVE-2024-40725]        |
|                          |                                          |
| base-files [5]           | Update for the point release             |
|                          |                                          |
| cacti [6]                | Fix remote code execution issues         |
|                          | [CVE-2024-25641 CVE-2024-31459], cross   |
|                          | site scripting issues [CVE-2024-29894    |
|                          | CVE-2024-31443 CVE-2024-31444], SQL      |
|                          | injection issues [CVE-2024-31445         |
|                          | CVE-2024-31458 CVE-2024-31460],  "type   |
|                          | juggling"  issue [CVE-2024-34340]; fix   |
|                          | autopkgtest failure                      |
|                          |                                          |
| calamares-settings-      | Fix Xfce launcher permission issue       |
| debian [7]               |                                          |
|                          |                                          |
| calibre [8]              | Fix remote code execution issue          |
|                          | [CVE-2024-6782, cross site scripting     |
|                          | issue [CVE-2024-7008], SQL injection     |
|                          | issue [CVE-2024-7009]                    |
|                          |                                          |
| choose-mirror [9]        | Update list of available mirrors         |
|                          |                                          |
| cockpit [10]             | Fix denial of service issue [CVE-2024-   |
|                          | 6126]                                    |
|                          |                                          |
| cups [11]                | Fix issues with domain socket handling   |
|                          | [CVE-2024-35235]                         |
|                          |                                          |
| curl [12]                | Fix ASN.1 date parser overread issue     |
|                          | [CVE-2024-7264]                          |
|                          |                                          |
| cyrus-imapd [13]         | Fix regression introduced in CVE-2024-   |
|                          | 34055 fix                                |
|                          |                                          |
| dcm2niix [14]            | Fix potential code execution issue       |
|                          | [CVE-2024-27629]                         |
|                          |                                          |
| debian-installer [15]    | Increase Linux kernel ABI to 6.1.0-25;   |
|                          | rebuild against proposed-updates         |
|                          |                                          |
| debian-installer-        | Rebuild against proposed-updates         |
| netboot-images [16]      |                                          |
|                          |                                          |
| dmitry [17]              | Security fixes [CVE-2024-31837 CVE-2020- |
|                          | 14931 CVE-2017-7938]                     |
|                          |                                          |
| dropbear [18]            | Fix  "noremotetcp"  behaviour of         |
|                          | keepalive packets in combination with    |
|                          | the  "no-port-forwarding"                |
|                          | authorized_keys(5) restriction           |
|                          |                                          |
| gettext.js [19]          | Fix server side request forgery issue    |
|                          | [CVE-2024-43370]                         |
|                          |                                          |
| glibc [20]               | Fix freeing uninitialized memory in      |
|                          | libc_freeres_fn(); fix several           |
|                          | performance issues and possible crashses |
|                          |                                          |
| glogic [21]              | Require Gtk 3.0 and PangoCairo 1.0       |
|                          |                                          |
| graphviz [22]            | Fix broken scale                         |
|                          |                                          |
| gtk+2.0 [23]             | Avoid looking for modules in the current |
|                          | working directory [CVE-2024-6655]        |
|                          |                                          |
| gtk+3.0 [24]             | Avoid looking for modules in the current |
|                          | working directory [CVE-2024-6655]        |
|                          |                                          |
| imagemagick [25]         | Fix segmentation fault issue; fix        |
|                          | incomplete fix for CVE-2023-34151        |
|                          |                                          |
| initramfs-tools [26]     | hook_functions: Fix copy_file with       |
|                          | source including a directory symlink;    |
|                          | hook-functions: copy_file: Canonicalise  |
|                          | target filename; install hid-multitouch  |
|                          | module for Surface Pro 4 Keyboard; add   |
|                          | hyper-keyboard module, needed to enter   |
|                          | LUKS password in Hyper-V;                |
|                          | auto_add_modules: Add onboard_usb_hub,   |
|                          | onboard_usb_dev                          |
|                          |                                          |
| intel-microcode [27]     | New upstream release; security fixes     |
|                          | [CVE-2023-42667 CVE-2023-49141 CVE-2024- |
|                          | 24853 CVE-2024-24980 CVE-2024-25939]     |
|                          |                                          |
| ipmitool [28]            | Add missing enterprise-numbers.txt file  |
|                          |                                          |
| libapache2-mod-auth-     | Avoid crash when the Forwarded header is |
| openidc [29]             | not present but OIDCXForwardedHeaders is |
|                          | configured for it                        |
|                          |                                          |
| libnvme [30]             | Fix buffer overflow during scanning      |
|                          | devices that do not support sub-4k reads |
|                          |                                          |
| libvirt [31]             | birsh: Make domif-setlink work more than |
|                          | once; qemu: domain: Fix logic when       |
|                          | tainting domain; fix denial of service   |
|                          | issues [CVE-2023-3750 CVE-2024-1441      |
|                          | CVE-2024-2494 CVE-2024-2496]             |
|                          |                                          |
| linux [32]               | New upstream release; bump ABI to 25     |
|                          |                                          |
| linux-signed-amd64 [33]  | New upstream release; bump ABI to 25     |
|                          |                                          |
| linux-signed-arm64 [34]  | New upstream release; bump ABI to 25     |
|                          |                                          |
| linux-signed-i386 [35]   | New upstream release; bump ABI to 25     |
|                          |                                          |
| newlib [36]              | Fix buffer overflow issue [CVE-2021-     |
|                          | 3420]                                    |
|                          |                                          |
| numpy [37]               | Conflict with python-numpy               |
|                          |                                          |
| openssl [38]             | New upstream stable release; fix denial  |
|                          | of service issues [CVE-2024-2511         |
|                          | CVE-2024-4603]; fix use after free issue |
|                          | [CVE-2024-4741]                          |
|                          |                                          |
| poe.app [39]             | Make comment cells editable; fix drawing |
|                          | when an NSActionCell in the preferences  |
|                          | is acted on to change state              |
|                          |                                          |
| putty [40]               | Fix weak ECDSA nonce generation allowing |
|                          | secret key recovery [CVE-2024-31497]     |
|                          |                                          |
| qemu [41]                | New upstream stable release; fix denial  |
|                          | of service issue [CVE-2024-4467]         |
|                          |                                          |
| riemann-c-client [42]    | Prevent malformed payload in GnuTLS      |
|                          | send/receive operations                  |
|                          |                                          |
| rustc-web [43]           | New upstream stable release, to support  |
|                          | building new chromium and firefox-esr    |
|                          | versions                                 |
|                          |                                          |
| shim [44]                | New upstream release                     |
|                          |                                          |
| shim-helpers-amd64-      | Rebuild against shim 15.8.1              |
| signed [45]              |                                          |
|                          |                                          |
| shim-helpers-arm64-      | Rebuild against shim 15.8.1              |
| signed [46]              |                                          |
|                          |                                          |
| shim-helpers-i386-       | Rebuild against shim 15.8.1              |
| signed [47]              |                                          |
|                          |                                          |
| shim-signed [48]         | New upstream stable release              |
|                          |                                          |
| systemd [49]             | New upstream stable release; update hwdb |
|                          |                                          |
| usb.ids [50]             | Update included data list                |
|                          |                                          |
| xmedcon [51]             | Fix buffer overflow issue [CVE-2024-     |
|                          | 29421]                                   |
|                          |                                          |
+--------------------------+------------------------------------------+

    1: https://packages.debian.org/src:amd64-microcode
    2: https://packages.debian.org/src:ansible
    3: https://packages.debian.org/src:ansible-core
    4: https://packages.debian.org/src:apache2
    5: https://packages.debian.org/src:base-files
    6: https://packages.debian.org/src:cacti
    7: https://packages.debian.org/src:calamares-settings-debian
    8: https://packages.debian.org/src:calibre
    9: https://packages.debian.org/src:choose-mirror
   10: https://packages.debian.org/src:cockpit
   11: https://packages.debian.org/src:cups
   12: https://packages.debian.org/src:curl
   13: https://packages.debian.org/src:cyrus-imapd
   14: https://packages.debian.org/src:dcm2niix
   15: https://packages.debian.org/src:debian-installer
   16: https://packages.debian.org/src:debian-installer-netboot-images
   17: https://packages.debian.org/src:dmitry
   18: https://packages.debian.org/src:dropbear
   19: https://packages.debian.org/src:gettext.js
   20: https://packages.debian.org/src:glibc
   21: https://packages.debian.org/src:glogic
   22: https://packages.debian.org/src:graphviz
   23: https://packages.debian.org/src:gtk+2.0
   24: https://packages.debian.org/src:gtk+3.0
   25: https://packages.debian.org/src:imagemagick
   26: https://packages.debian.org/src:initramfs-tools
   27: https://packages.debian.org/src:intel-microcode
   28: https://packages.debian.org/src:ipmitool
   29: https://packages.debian.org/src:libapache2-mod-auth-openidc
   30: https://packages.debian.org/src:libnvme
   31: https://packages.debian.org/src:libvirt
   32: https://packages.debian.org/src:linux
   33: https://packages.debian.org/src:linux-signed-amd64
   34: https://packages.debian.org/src:linux-signed-arm64
   35: https://packages.debian.org/src:linux-signed-i386
   36: https://packages.debian.org/src:newlib
   37: https://packages.debian.org/src:numpy
   38: https://packages.debian.org/src:openssl
   39: https://packages.debian.org/src:poe.app
   40: https://packages.debian.org/src:putty
   41: https://packages.debian.org/src:qemu
   42: https://packages.debian.org/src:riemann-c-client
   43: https://packages.debian.org/src:rustc-web
   44: https://packages.debian.org/src:shim
   45: https://packages.debian.org/src:shim-helpers-amd64-signed
   46: https://packages.debian.org/src:shim-helpers-arm64-signed
   47: https://packages.debian.org/src:shim-helpers-i386-signed
   48: https://packages.debian.org/src:shim-signed
   49: https://packages.debian.org/src:systemd
   50: https://packages.debian.org/src:usb.ids
   51: https://packages.debian.org/src:xmedcon

Security Updates
----------------

This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:

+----------------+--------------------------+
| Advisory ID    | Package                  |
+----------------+--------------------------+
| DSA-5617 [52]  | chromium [53]            |
|                |                          |
| DSA-5629 [54]  | chromium [55]            |
|                |                          |
| DSA-5634 [56]  | chromium [57]            |
|                |                          |
| DSA-5636 [58]  | chromium [59]            |
|                |                          |
| DSA-5639 [60]  | chromium [61]            |
|                |                          |
| DSA-5648 [62]  | chromium [63]            |
|                |                          |
| DSA-5654 [64]  | chromium [65]            |
|                |                          |
| DSA-5656 [66]  | chromium [67]            |
|                |                          |
| DSA-5668 [68]  | chromium [69]            |
|                |                          |
| DSA-5675 [70]  | chromium [71]            |
|                |                          |
| DSA-5676 [72]  | chromium [73]            |
|                |                          |
| DSA-5683 [74]  | chromium [75]            |
|                |                          |
| DSA-5687 [76]  | chromium [77]            |
|                |                          |
| DSA-5689 [78]  | chromium [79]            |
|                |                          |
| DSA-5694 [80]  | chromium [81]            |
|                |                          |
| DSA-5696 [82]  | chromium [83]            |
|                |                          |
| DSA-5697 [84]  | chromium [85]            |
|                |                          |
| DSA-5701 [86]  | chromium [87]            |
|                |                          |
| DSA-5710 [88]  | chromium [89]            |
|                |                          |
| DSA-5716 [90]  | chromium [91]            |
|                |                          |
| DSA-5719 [92]  | emacs [93]               |
|                |                          |
| DSA-5720 [94]  | chromium [95]            |
|                |                          |
| DSA-5722 [96]  | libvpx [97]              |
|                |                          |
| DSA-5723 [98]  | plasma-workspace [99]    |
|                |                          |
| DSA-5724 [100] | openssh [101]            |
|                |                          |
| DSA-5725 [102] | znc [103]                |
|                |                          |
| DSA-5726 [104] | krb5 [105]               |
|                |                          |
| DSA-5727 [106] | firefox-esr [107]        |
|                |                          |
| DSA-5728 [108] | exim4 [109]              |
|                |                          |
| DSA-5729 [110] | apache2 [111]            |
|                |                          |
| DSA-5731 [112] | linux-signed-amd64 [113] |
|                |                          |
| DSA-5731 [114] | linux-signed-arm64 [115] |
|                |                          |
| DSA-5731 [116] | linux-signed-i386 [117]  |
|                |                          |
| DSA-5731 [118] | linux [119]              |
|                |                          |
| DSA-5732 [120] | chromium [121]           |
|                |                          |
| DSA-5734 [122] | bind9 [123]              |
|                |                          |
| DSA-5735 [124] | chromium [125]           |
|                |                          |
| DSA-5737 [126] | libreoffice [127]        |
|                |                          |
| DSA-5738 [128] | openjdk-17 [129]         |
|                |                          |
| DSA-5739 [130] | wpa [131]                |
|                |                          |
| DSA-5740 [132] | firefox-esr [133]        |
|                |                          |
| DSA-5741 [134] | chromium [135]           |
|                |                          |
| DSA-5743 [136] | roundcube [137]          |
|                |                          |
| DSA-5745 [138] | postgresql-15 [139]      |
|                |                          |
| DSA-5748 [140] | ffmpeg [141]             |
|                |                          |
| DSA-5749 [142] | bubblewrap [143]         |
|                |                          |
| DSA-5749 [144] | flatpak [145]            |
|                |                          |
| DSA-5750 [146] | python-asyncssh [147]    |
|                |                          |
| DSA-5751 [148] | squid [149]              |
|                |                          |
| DSA-5752 [150] | dovecot [151]            |
|                |                          |
| DSA-5753 [152] | aom [153]                |
|                |                          |
| DSA-5754 [154] | cinder [155]             |
|                |                          |
| DSA-5755 [156] | glance [157]             |
|                |                          |
| DSA-5756 [158] | nova [159]               |
|                |                          |
| DSA-5757 [160] | chromium [161]           |
|                |                          |
+----------------+--------------------------+

   52: https://www.debian.org/security/2024/dsa-5617
   53: https://packages.debian.org/src:chromium
   54: https://www.debian.org/security/2024/dsa-5629
   55: https://packages.debian.org/src:chromium
   56: https://www.debian.org/security/2024/dsa-5634
   57: https://packages.debian.org/src:chromium
   58: https://www.debian.org/security/2024/dsa-5636
   59: https://packages.debian.org/src:chromium
   60: https://www.debian.org/security/2024/dsa-5639
   61: https://packages.debian.org/src:chromium
   62: https://www.debian.org/security/2024/dsa-5648
   63: https://packages.debian.org/src:chromium
   64: https://www.debian.org/security/2024/dsa-5654
   65: https://packages.debian.org/src:chromium
   66: https://www.debian.org/security/2024/dsa-5656
   67: https://packages.debian.org/src:chromium
   68: https://www.debian.org/security/2024/dsa-5668
   69: https://packages.debian.org/src:chromium
   70: https://www.debian.org/security/2024/dsa-5675
   71: https://packages.debian.org/src:chromium
   72: https://www.debian.org/security/2024/dsa-5676
   73: https://packages.debian.org/src:chromium
   74: https://www.debian.org/security/2024/dsa-5683
   75: https://packages.debian.org/src:chromium
   76: https://www.debian.org/security/2024/dsa-5687
   77: https://packages.debian.org/src:chromium
   78: https://www.debian.org/security/2024/dsa-5689
   79: https://packages.debian.org/src:chromium
   80: https://www.debian.org/security/2024/dsa-5694
   81: https://packages.debian.org/src:chromium
   82: https://www.debian.org/security/2024/dsa-5696
   83: https://packages.debian.org/src:chromium
   84: https://www.debian.org/security/2024/dsa-5697
   85: https://packages.debian.org/src:chromium
   86: https://www.debian.org/security/2024/dsa-5701
   87: https://packages.debian.org/src:chromium
   88: https://www.debian.org/security/2024/dsa-5710
   89: https://packages.debian.org/src:chromium
   90: https://www.debian.org/security/2024/dsa-5716
   91: https://packages.debian.org/src:chromium
   92: https://www.debian.org/security/2024/dsa-5719
   93: https://packages.debian.org/src:emacs
   94: https://www.debian.org/security/2024/dsa-5720
   95: https://packages.debian.org/src:chromium
   96: https://www.debian.org/security/2024/dsa-5722
   97: https://packages.debian.org/src:libvpx
   98: https://www.debian.org/security/2024/dsa-5723
   99: https://packages.debian.org/src:plasma-workspace
  100: https://www.debian.org/security/2024/dsa-5724
  101: https://packages.debian.org/src:openssh
  102: https://www.debian.org/security/2024/dsa-5725
  103: https://packages.debian.org/src:znc
  104: https://www.debian.org/security/2024/dsa-5726
  105: https://packages.debian.org/src:krb5
  106: https://www.debian.org/security/2024/dsa-5727
  107: https://packages.debian.org/src:firefox-esr
  108: https://www.debian.org/security/2024/dsa-5728
  109: https://packages.debian.org/src:exim4
  110: https://www.debian.org/security/2024/dsa-5729
  111: https://packages.debian.org/src:apache2
  112: https://www.debian.org/security/2024/dsa-5731
  113: https://packages.debian.org/src:linux-signed-amd64
  114: https://www.debian.org/security/2024/dsa-5731
  115: https://packages.debian.org/src:linux-signed-arm64
  116: https://www.debian.org/security/2024/dsa-5731
  117: https://packages.debian.org/src:linux-signed-i386
  118: https://www.debian.org/security/2024/dsa-5731
  119: https://packages.debian.org/src:linux
  120: https://www.debian.org/security/2024/dsa-5732
  121: https://packages.debian.org/src:chromium
  122: https://www.debian.org/security/2024/dsa-5734
  123: https://packages.debian.org/src:bind9
  124: https://www.debian.org/security/2024/dsa-5735
  125: https://packages.debian.org/src:chromium
  126: https://www.debian.org/security/2024/dsa-5737
  127: https://packages.debian.org/src:libreoffice
  128: https://www.debian.org/security/2024/dsa-5738
  129: https://packages.debian.org/src:openjdk-17
  130: https://www.debian.org/security/2024/dsa-5739
  131: https://packages.debian.org/src:wpa
  132: https://www.debian.org/security/2024/dsa-5740
  133: https://packages.debian.org/src:firefox-esr
  134: https://www.debian.org/security/2024/dsa-5741
  135: https://packages.debian.org/src:chromium
  136: https://www.debian.org/security/2024/dsa-5743
  137: https://packages.debian.org/src:roundcube
  138: https://www.debian.org/security/2024/dsa-5745
  139: https://packages.debian.org/src:postgresql-15
  140: https://www.debian.org/security/2024/dsa-5748
  141: https://packages.debian.org/src:ffmpeg
  142: https://www.debian.org/security/2024/dsa-5749
  143: https://packages.debian.org/src:bubblewrap
  144: https://www.debian.org/security/2024/dsa-5749
  145: https://packages.debian.org/src:flatpak
  146: https://www.debian.org/security/2024/dsa-5750
  147: https://packages.debian.org/src:python-asyncssh
  148: https://www.debian.org/security/2024/dsa-5751
  149: https://packages.debian.org/src:squid
  150: https://www.debian.org/security/2024/dsa-5752
  151: https://packages.debian.org/src:dovecot
  152: https://www.debian.org/security/2024/dsa-5753
  153: https://packages.debian.org/src:aom
  154: https://www.debian.org/security/2024/dsa-5754
  155: https://packages.debian.org/src:cinder
  156: https://www.debian.org/security/2024/dsa-5755
  157: https://packages.debian.org/src:glance
  158: https://www.debian.org/security/2024/dsa-5756
  159: https://packages.debian.org/src:nova
  160: https://www.debian.org/security/2024/dsa-5757
  161: https://packages.debian.org/src:chromium

Removed packages
----------------

The following packages were removed due to circumstances beyond our
control:

+----------------------+-----------------+
| Package              | Reason          |
+----------------------+-----------------+
| bcachefs-tools [162] | Buggy; obsolete |
|                      |                 |
+----------------------+-----------------+

  162: https://packages.debian.org/src:bcachefs-tools

Debian Installer
----------------

The installer has been updated to include the fixes incorporated into
stable by the point release.


URLs
----

The complete lists of packages that have changed with this revision:

https://deb.debian.org/debian/dists/bookworm/ChangeLog


The current stable distribution:

https://deb.debian.org/debian/dists/stable/


Proposed updates to the stable distribution:

https://deb.debian.org/debian/dists/proposed-updates


stable distribution information (release notes, errata etc.):

https://www.debian.org/releases/stable/


Security announcements and information:

https://www.debian.org/security/



About Debian
------------

The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.


Contact Information
-------------------

For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to <press@debian.org>, or contact the
stable release team at <debian-release@lists.debian.org>.

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: